Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends
☆26Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for APTv4_Defcon28
Users that are interested in APTv4_Defcon28 are comparing it to the libraries listed below
Sorting:
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Defensive Origins Training Schedule☆39Dec 11, 2023Updated 2 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Purple Teaming Attack & Hunt Lab - Terraform☆162Nov 29, 2021Updated 4 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆63Oct 29, 2024Updated last year
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Atomic Purple Team Framework and Lifecycle☆299Feb 11, 2021Updated 5 years ago
- ☆19Jul 9, 2022Updated 3 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- Purple Team Strategies, Published by Packt☆14Mar 2, 2026Updated 2 weeks ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Cloud-based AD lab created to help you test real attacks in a controlled environment and create detection rules for them☆29Feb 23, 2024Updated 2 years ago
- OllaDeck is a purple technology stack for Generative AI (text modality) cybersecurity. It provides a comprehensive set of tools for both …☆18Sep 21, 2024Updated last year
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Used to AES encrypt shellcode, can take password or use built in default should be used with Iron Injector to generate and execute shellc…☆15Mar 18, 2022Updated 4 years ago
- Future home of our DC28 badge☆15Oct 23, 2020Updated 5 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated last month
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Mar 11, 2026Updated last week
- ☆32Oct 21, 2023Updated 2 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆50Jan 30, 2026Updated last month
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆21Feb 11, 2025Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- ☆15Mar 12, 2025Updated last year
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- ☆45Apr 10, 2024Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Cobalt Strike random C2 Profile generator☆16Mar 4, 2026Updated 2 weeks ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- Burp Suite extension to discover assets from HTTP response.☆16May 18, 2021Updated 4 years ago
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 weeks ago